August 1981 | Technical Report TR-81-79

A Critique of Some Public-Key Cryptosystems

Cite This Publication

William J. Hartman

Abstract: Several of the public-key cryptosystems that received considerable publicity are examined. The uses, implementation, and potential cryptoanalytic attacks are discussed. Since most of the suggested systems depend on the manipulation of large numbers, special multi precision computer programs have been developed to demonstrate system implementation and cryptoanalytic attacks. Examples of the use and timing of these programs are included.

Keywords: Public-key; number theory; cryptology; algorithms

Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.

For questions or information on this or any other NTIA scientific publication, contact the ITS Publications Office at ITSinfo@ntia.gov or 303-497-3572.

Back to Search Results